Technical University Braunschweig - Computer Science - Operating Systems and Computer Networks
Authentication in Computer Networks
The term authentication is used to describe the proof of a claimed identity. This project deals with the analysis of properties of authentication protocols.

Based on the analysis of the Kerberos protocol, we suggested a nonce based protocol which does not rely on synchronized clocks. An analysis with the BAN logic (named after their authors M. Burrows, M. Abadi and R. Needham) proves the correctness of our protocol.

Nonce-based Authentication Protocol

In this protocol two principals A and B, not sharing any secret, want to authenticate each other. A trusted authentication server S shares a secret key with each principal. Since no timestamps relying on synchronized clocks are used in this protocol, the freshness of the messages is achieved with nonces, which are a kind of once used keys.

Papers published in this project
© IBR, TU Braunschweig, last updated 08-05-1998 12:40:51 by Juergen Schoenwaelder <schoenw@ibr.cs.tu-bs.de>